Title: Pro Java Programming, Author: Terrill Brett Spell
Title: Smart Card Application Development Using Java, Author: Uwe Hansmann
Title: Pro Apache NetBeans: Building Applications on the Rich Client Platform, Author: Ioannis Kostaras
Title: Java Cookbook: Problems and Solutions for Java Developers, Author: Ian F. Darwin
Title: Microsoft Azure for Java Developers: Deploying Java Applications through Azure WebApp, Azure Kubernetes Service, Azure Functions, and Azure Spring Cloud, Author: Abhishek Mishra
Title: Data Structures: Abstraction and Design Using Java, Author: Elliot B. Koffman
Title: Beginning EJB in Java EE 8: Building Applications with Enterprise JavaBeans, Author: Jonathan Wetherbee
Title: The Definitive Guide to Jakarta Faces in Jakarta EE 10: Building Java-Based Enterprise Web Applications, Author: Bauke Scholtz
Title: Spring 6 Recipes: A Problem-Solution Approach to Spring Framework, Author: Marten Deinum
Title: Data Science with Java: Practical Methods for Scientists and Engineers, Author: Michael Brzustowicz
Title: Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 21 LTS and Jakarta EE 11, Author: Stefania Loredana Nita
Title: Core Java, Volume II: Advanced Features, Author: Cay Horstmann
Title: Learning Java: An Introduction to Real-World Programming with Java, Author: Marc Loy
Title: Learning Java: A Test-Driven Approach, Author: Joshua Crotts
Title: Big Java: Late Objects, Author: Cay S. Horstmann
Title: Effective Java, Author: Joshua Bloch
Title: Program Development in Java: Abstraction, Specification, and Object-Oriented Design, Author: Barbara Liskov
Title: Java EE 8 Application Development: Develop Enterprise applications using the latest versions of CDI, JAX-RS, JSON-B, JPA, Security, and more, Author: David R Heffelfinger
Title: Java 17 Backend Development: Design backend systems using Spring Boot, Docker, Kafka, Eureka, Redis, and Tomcat, Author: Elara Drevyn
Title: Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 protocols to secure applications, Author: Stian Thorgersen

Pagination Links